Skip to main content
Mallory

Critical ScreenConnect Flaw Exposes Machine Keys and Enables Session Hijacking

widely-deployed-product-advisoryidentity-authentication-vulnerabilityperimeter-device-exposurecredential-access-method
Updated March 20, 2026 at 10:03 AM7 sources
Share:
Critical ScreenConnect Flaw Exposes Machine Keys and Enables Session Hijacking

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

ConnectWise ScreenConnect disclosed a critical vulnerability, CVE-2026-3564 (CVSS 9.0), affecting versions prior to 26.1. The flaw stems from ScreenConnect storing unique per-instance machine keys and related cryptographic material in plaintext server configuration files, creating a path for attackers under certain conditions to extract those keys and abuse them for unauthorized access. The issue is classified as CWE-347: Improper Verification of Cryptographic Signature, and successful exploitation can undermine confidentiality, integrity, and availability in environments that rely on ScreenConnect for remote access.

With the exposed machine keys, an attacker could forge or manipulate session authentication tokens, hijack legitimate sessions, and elevate access without user interaction. ConnectWise rated the issue as high priority, and the Centre for Cybersecurity Belgium urged organizations to patch immediately, monitor for suspicious activity, and treat updates as protection against future exploitation rather than proof that no prior compromise occurred. The vendor states the issue is fixed in version 26.1, making rapid remediation and post-patch review important for on-premises deployments.

Timeline

  1. Mar 18, 2026

    National cyber agencies warn users to patch ScreenConnect immediately

    On March 18, 2026, government cybersecurity bodies including Belgium's CCB and Canada's Cyber Centre amplified ConnectWise's advisory and urged organizations to review guidance and apply the 26.1 update promptly. Their notices highlighted the severity of the issue for ScreenConnect deployments prior to version 26.1.

  2. Mar 17, 2026

    ConnectWise discloses critical ScreenConnect flaw CVE-2026-3564

    On March 17, 2026, ConnectWise disclosed a critical vulnerability in ScreenConnect affecting all versions prior to 26.1 that could let attackers extract or abuse ASP.NET machine keys, hijack session authentication, gain unauthorized access, and escalate privileges. The company urged on-premises customers to treat remediation as urgent and said it had no evidence of active exploitation of this specific CVE.

  3. Mar 17, 2026

    ConnectWise releases ScreenConnect 26.1 security hardening bulletin

    ConnectWise published a security bulletin for ScreenConnect 26.1 security hardening, addressing a critical flaw later tracked as CVE-2026-3564. The update introduced stronger machine key protections, including encrypted storage and improved key management, and cloud-hosted instances were already mitigated.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

March 18, 2026 at 12:00 AM

2 more from sources like belgium ccb security advisories and connectwise.com

Related Stories

Critical ScreenConnect Vulnerability Allows Configuration Data Exposure and Untrusted Extension Installation

Critical ScreenConnect Vulnerability Allows Configuration Data Exposure and Untrusted Extension Installation

ConnectWise released a security update for ScreenConnect to address a critical vulnerability, tracked as CVE-2025-14265, which affects the server component of the remote access platform. The flaw, caused by improper code integrity validation during extension installations (CWE-494), could allow attackers with authorized or administrative access to expose sensitive configuration data and install untrusted extensions. The vulnerability carries a CVSS 3.1 base score of 9.1, highlighting its severity, though ConnectWise reports no evidence of active exploitation at this time. The issue impacts all ScreenConnect versions prior to 25.8, and the 25.8 patch enforces stricter server-side validation and integrity checks for extension installations. ConnectWise has automatically applied updates to cloud-hosted ScreenConnect instances, while on-premises users must manually upgrade to version 25.8. Partners using Automate integration are advised to update their Automate ScreenConnect Extension before upgrading ScreenConnect itself. Security advisories from both ConnectWise and the Canadian Centre for Cyber Security urge organizations to prioritize patching to prevent potential unauthorized access and maintain secure remote management environments. The vulnerability is rated as Priority 2 – Moderate, with a recommended update window of 30 days, but immediate action is encouraged due to the risk of sensitive data exposure.

1 months ago
ConnectWise Automate Vulnerabilities Allowing Fake Updates and Unencrypted Communications

ConnectWise Automate Vulnerabilities Allowing Fake Updates and Unencrypted Communications

ConnectWise Automate, a widely used IT management platform, was found to contain two critical vulnerabilities, CVE-2025-11492 and CVE-2025-11493, which were addressed in the security update for version 2025.9. The first vulnerability, CVE-2025-11492, is rated with a CVSS score of 9.6 and arises from agents transmitting data without encryption when configured to use HTTP instead of HTTPS. This flaw allows attackers with network access to intercept or modify unencrypted communications, potentially exposing sensitive credentials or commands. The second vulnerability, CVE-2025-11493, with a CVSS score of 8.8, is due to missing integrity verification during the update process. This could enable attackers to inject malicious or tampered update files that appear legitimate, leading to unauthorized code execution on managed systems. Both vulnerabilities primarily affect on-premises deployments of ConnectWise Automate running versions prior to 2025.9. ConnectWise published a security advisory on October 16, 2025, urging customers to update to version 2025.9 to mitigate these risks. The Canadian Centre for Cyber Security also issued an alert, recommending that users and administrators review the advisories and apply the necessary updates immediately. The flaws highlight the risks associated with improper use of unsecured communication protocols and the lack of integrity checks in software update mechanisms. Organizations hosting on-premises Automate servers are particularly at risk if they have not yet applied the latest security fixes. The vulnerabilities could be exploited by attackers already present within the network, emphasizing the importance of internal network security and monitoring. The exposure of credentials or the ability to execute unauthorized code could lead to further compromise of managed endpoints. Security experts recommend that organizations not only update their ConnectWise Automate installations but also review their network configurations to ensure encrypted communications are enforced. The advisories stress the urgency of patching, as threat actors may attempt to weaponize these vulnerabilities quickly. The incident underscores the broader need for robust security practices in IT management platforms, which are often high-value targets for attackers. ConnectWise has provided detailed guidance and links to the latest advisories to assist customers in remediation. The vulnerabilities serve as a reminder of the importance of secure software development and regular security assessments for critical infrastructure tools. Organizations are advised to monitor for signs of exploitation and to implement additional controls where possible to mitigate the risk of similar vulnerabilities in the future.

1 months ago
CISA KEV Adds Marimo RCE, ScreenConnect Path Traversal, and Windows Spoofing Flaws

CISA KEV Adds Marimo RCE, ScreenConnect Path Traversal, and Windows Spoofing Flaws

CISA updated its Known Exploited Vulnerabilities catalog to add three vulnerabilities now tracked as actively exploited: **CVE-2026-39987** in Marimo, **CVE-2024-1708** in ConnectWise ScreenConnect, and **CVE-2026-32202** in Microsoft Windows. The Marimo issue was added in a catalog update that raised the total count to 1,579 entries, while a later update increased the catalog to 1,585 entries and included the ScreenConnect and Windows flaws. CISA described **CVE-2026-39987** as an unauthenticated remote code execution vulnerability that can provide shell access and allow arbitrary system command execution before authorization, mapped to `CWE-306`. **CVE-2024-1708** was listed as a ScreenConnect path traversal flaw that could enable remote code execution or directly affect confidential data and critical systems, and **CVE-2026-32202** was identified as a Windows Shell protection mechanism failure that allows network spoofing by an unauthorized attacker. CISA directed organizations to apply vendor mitigations, follow **BOD 22-01** guidance for cloud services, or discontinue use if mitigations are unavailable; remediation deadlines were set for **2026-05-07** for Marimo and **2026-05-12** for the ScreenConnect and Windows entries.

4 days ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.